Hardware

Episode 174: GE’s Very Bad Day – Unpacking the MDHex Vulnerabilities

The U.S. Department of Homeland Security warned of critical vulnerabilities in a range of products by GE. We speak with Elad Luz, the head of research at CyberMDX, which discovered the holes.

Logic Boards in a Pile

IT Asset Disposition (ITAD) is the Slow Motion Data Breach Nobody notices

Efforts to wall off sensitive corporate and government data from foreign adversaries have a gaping hole: IT asset disposition (ITAD), where vendors – many owned by Chinese firms – process discarded hardware and data with little oversight.

DEF CON vote machine hacking

Episode 172: Securing the Election Supply Chain

In this episode of the podcast (#172), Jennifer Bisceglie, the founder and CEO of Interos to talk about the links between America’s voting infrastructure and countries with a history of trying to subvert democracy.

Hacker Image

Spotlight Podcast: Building Resilience into the IoT with Rob Spiger

In this Spotlight edition of the Security Ledger Podcast, sponsored by Trusted Computing Group*: we’re joined by Rob Spiger, a principal security strategist at Microsoft and co-chair of the cyber resilient technologies working group at Trusted Computing Group. Rob talks to us about efforts to make more resilient connected devices and how the advent of the Internet of Things is changing TCG’s approach to building cyber resilient systems.

Electronic voting machines.

Study finds Chinese Hardware Powers U.S. Voting Machine

A new study by the firm Interos found that many hardware components in a popular touchscreen voting machine used in the U.S. originate in China or Russia.